The Internet & Freedom Of The Press

Internet freedom is the right to use the net without restriction, censorship, or enforced bias. The more digital liberties you can act on in your country, the more Internet freedom you have. No country is 100% free. Some restrictions, like preventing the spread of illegal content or protecting classified information appear justifiable, but most governments around the world have more or less restrictive regimes.

In 2021, Iceland ranked first in terms of Internet freedom worldwide. The country placed first with 96 index points on the Freedom House Index and by this measure Iceland is the world’s best protector of Internet freedom

Internet users in Iceland enjoy near-universal connectivity, minimal restrictions on online content, and strong protections for their rights online. The next in the top list that allow Internet freedom are Estonia and then Canada, Germany and the UK, next is France, Georgia, Italy, Japan, Australia, the USA and South Africa.

It is Russia which is the latest country to try to find ways to police its online borders, sparking the end of the Internet as we know it.

The history of countries' media restrictions goes back to 1648 when the Treaty of Westphalia was signed, ending 30 years of war across Europe and bringing about the sovereignty of states. The rights of states to control and defend their own territory became the core foundation of our global political order, and it has remained unchallenged since.

In 2010, a delegation of countries, including Syria and Russia, came to a little-known agency of the United Nations with a strange request: to define those same sovereign geographic borders onto the digital world. Today, Eritrea and North Korea are the first and second most censored countries worldwide, according to a list compiled by the press freedom charity, Committee to Protect Journalists of the 10 countries where the press is most restricted.

The list is based on research into the use of tactics ranging from imprisonment and repressive laws to harassment of journalists and restrictions on Internet access.

In Eritrea, President Isaias Afewerki has succeeded in his campaign to crush independent journalism, creating a media climate so oppressive that even reporters for state-run news outlets live in constant fear of arrest. The threat of imprisonment has led many journalists to choose exile rather than risk arrest. Eritrea is Africa’s worst jailer of journalists, with at least 23 behind bars-none of whom has been tried in court or even charged with a crime.

Fearing the spread of Arab Spring uprisings, Eritrea scrapped plans in 2011 to provide mobile Internet for its citizens, limiting the possibility of access to independent information. Although the Internet is available, it is through slow dial-up connections, and fewer than 1 percent of the population goes online, according to the UN International Telecommunications Union figures.

Eritrea also has the lowest figure globally of cell phone users, with just 5.6 percent of the population owning one. In North Korea, 9.7 percent of the population has cell phones, a number that excludes access to phones smuggled in from China. In place of the global Internet, to which only a select few powerful individuals have access, some schools and other institutions have access to a tightly controlled intranet. Despite the arrival of an Associated Press bureau in Pyongyang in 2012, the state has such a tight grip on the news agenda that news footage was re-edited to remove Kim Jong Un’s disgraced uncle from the archives after his execution.

The tactics used by Eritrea and North Korea are mirrored to varying degrees in other heavily censored countries. To keep their grip on power, repressive regimes use a combination of media monopoly, harassment, spying, threats of journalist imprisonment, and restriction of journalists’ entry into or movements within their countries.

  • China, despite having hundreds of millions of Internet users, maintains the Great Firewall a sophisticated blend of human censors and technological tools, to block critical websites and rein in social media.

In countries with advanced technology such as China, Internet restrictions are combined with the threat of imprisonment to ensure that critical voices cannot be heard online.

Yet there is no doubt that access to the Internet, for those who can regularly go online in China, has had a profound impact on how people view the news and their government, and how they respond to injustices in their day-to-day lives.

Already, before the new leadership even took the helm, the public knew far more about their new leaders than they have at any time in the past, information that censors have fought hard to keep hidden.

It’s well known that some countries are unhappy with the Western consensus that has traditionally held sway over Internet governance. It’s not just the philosophies espoused by the West that troubles them, but the way those philosophies were baked into the very architecture of the Internet, which is famously engineered to ensure no one can prevent anyone from sending anything to anyone.

CPJ:     Privacy Hub:     BBC:    The Street:     Statista:    Quora:   Security:  

You Might Also Read: 

Russia Will Create Its Own Internet

 

« Russia - Unplugged
Axonius Brings Its Platform To AWS Marketplace »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Kaymera Technologies

Kaymera Technologies

Kaymera’s comprehensive mobile enterprise security solution defends against all mobile threat and attack vectors.

RKH Specialty

RKH Specialty

RKH Specialty, part of the Hyperion Insurance Group, is a provider of specialty insurance services including Cyber Risk cover.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

Agility Networks

Agility Networks

Agility Networks is a technology company providing integrated services and solutions for Digital Transformation and Cyber Security.

Cowbell Cyber

Cowbell Cyber

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

IoTeX

IoTeX

Building the connected world. IoTeX is a fast, secure, and decentralized platform that connects real world devices/data to the blockchain.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

Infosec Ventures

Infosec Ventures

Infosec Ventures incubates and scales cyber security innovators that solve inefficiencies in cyber security.